US6496949B1 - Emergency backup system, method and program product therefor - Google Patents

Emergency backup system, method and program product therefor Download PDF

Info

Publication number
US6496949B1
US6496949B1 US09/369,783 US36978399A US6496949B1 US 6496949 B1 US6496949 B1 US 6496949B1 US 36978399 A US36978399 A US 36978399A US 6496949 B1 US6496949 B1 US 6496949B1
Authority
US
United States
Prior art keywords
data
emergency
computers
network
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US09/369,783
Inventor
Dimitri Kanevsky
Wlodek Zadrozny
Alexander Zlatsin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US09/369,783 priority Critical patent/US6496949B1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ZADROZNY, WLODEK, KANEVSKY, DIMITRI, ZLATSIN, ALEXANDER
Application granted granted Critical
Publication of US6496949B1 publication Critical patent/US6496949B1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1461Backup scheduling policy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1456Hardware arrangements for backup
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques

Definitions

  • the present invention is related to disaster recovery and, more particularly, to disaster recovery for computer systems and methods therefor.
  • UPS emergency universal power supply
  • the present invention is an emergency backup system, method and computer program product for backing up data on one or more computers located in a danger zone.
  • the computers in the danger zone are connected to a backup network
  • the computers may be distributed at various remote locations.
  • Protected locations are locations that include a sensor for sensing an emergency situation and signaling local computers of the pending emergency. The sensor also signals remote computers of the emergency.
  • the computers may have been connected together over a network or, upon receiving an emergency signal, may connect together into a backup network.
  • Local computers in the danger zone arc connected across the network to remote computers that have sufficient available storage to backup data from the connected local computers.
  • the backup may be a full backup, a partial backup or a selective backup.
  • the computers may include PCs, PDAs and servers.
  • the network may be a LAN, a wireless network, a phone network or a WAN.
  • FIG. 1 shows a computer network wherein upon occurrence of an emergency condition, e.g. a fire or earthquake, computers within the zone of danger initiate backup of vulnerable data;
  • an emergency condition e.g. a fire or earthquake
  • FIG. 2 represents an example of the preferred database structure
  • FIG. 3 is a flow diagram of the preferred embodiment emergency backup process
  • FIG. 4 is another embodiment wherein, computers in the safe zone can override the receiving points defined in the emergency backup map.
  • FIG. 1 shows a computer network 100 wherein upon occurrence of an emergency condition, e.g. a fire or earthquake, computers within the zone of danger initiate backup of vulnerable data.
  • the network 100 may be, for example only, a local area network (LA, a wireless network, a phone network or a wide area network (WAN).
  • the network 100 includes multiple connected computers 102 , 104 , 116 distributed, for example, in different rooms, 106 , 108 or in different buildings.
  • the computers 102 , 104 , 116 may include, for example, one or more servers 116 and one or more personal computers 102 , 104 .
  • the network 100 may also include connected hand held computers 110 , 112 such as those commonly referred to as personal digital assistants (PDAs).
  • PDAs personal digital assistants
  • a remote sensor 114 is located in at least one room 106 to sense and signal the occurrence of an emergency condition, e.g. a fire or earthquake.
  • a server 116 may also be connected to the network 100 for additional back up resources and to maintain a disaster center database that includes disaster response models.
  • a disaster response model is a model of a disaster or of a prior emergency situation paired with a preselected response for such an anticipated disaster.
  • the sensor 114 Upon sensing an emergency, the sensor 114 sends a signal to vulnerable computers 102 , 110 in the danger zone, room 106 in this example. The signal is further transmitted either directly or indirectly to computers 104 , 112 and server 116 in safe areas outside of the danger zone. If the transmission is direct, the signal is transmitted to receivers in the remote computers 104 , 112 . If the transmission is indirect, then the signal is transmitted by computers 102 , 110 over the network 100 to the remote computers 104 , 112 .
  • each endangered computer 102 , 110 Upon receiving the signal, each endangered computer 102 , 110 initiates a backup process, to backup data stored, for example, in files or databases in the computers 102 , 110 .
  • the type of backup done in an emergency is pre-selected by the system administrator or owner. Accordingly, the backup may be, for example, a full backup wherein all data, e.g., the entire database, is backed up, a partial backup wherein only previously identified data or data changed since the last backup is backed up, or a selective backup wherein previously selected data is backed up.
  • the emergency sensor 114 may be, for example, a fire detector, an earthquake detector, a water sensor, an air pressure sensor, a pressure sensor, a smell sensor, a heat detector or sensor.
  • the emergency signal sent by the sensor may be an audio signal, a radio signal or, an electrical signal sent over an electrical line connected from the sensor 114 to the computer 102 . Further, if audio signal, such as a fire alarm, an earthquake alarm, a flood alarm or a volcano alarm, are employed the computers 102 , 110 are equipped to recognize the audible alarm.
  • FIG. 2 shows an example of the organization of one of the intended backup computers, e.g., server 116 , which includes a classifier module 118 that generates a database 120 having the preferred structure.
  • server 116 which includes a classifier module 118 that generates a database 120 having the preferred structure.
  • information in the database 120 is passed to a network mapper 121 in server 116 to direct formation of an emergency backup network 100 .
  • the classifier module 118 which is linked to other network databases (not shown), creates a database structure 120 that includes a priority index 122 , a change index 124 , security labeling 126 and an emergency network map 128 .
  • a global backup service may employ the server 116 to provide backup coverage of multiple connected computers, e.g., 102 , 110 . Additionally, some of the computers 102 , 110 may include a local backup service.
  • Each local backup service which may be included on some or all local computers or embedded devices, is structured like the service structure of FIG. 2, but provides coverage only for local data located on the same local computer, instead of providing emergency backup for all computers in the danger zone.
  • emergency network map 128 points only to potential connections between the local computer and other computers that might serve as backup computers, where the locally backed up data may be sent.
  • Such local emergency backup services require that the computer upon which the local service resides have sufficient memory to handle the backup and sufficient storage available to backup tie data.
  • This local backup service has some advantages over a direct link to a global backup server because, during an emergency backup, network contact with an outside global backup server may be lost, which could disrupt the emergency global backup.
  • a computer including such a local backup scheme is configured similar to FIG. 2 . Therefore, no additional description is required.
  • the priority index 122 of database 120 has a structure that may include, for example, a list 130 of sensitive data that is most likely to be lost; unopened e-mail 132 , as well as previously opened but retained e-mail; data 134 that has been previously identified by a user for backup; and source code 136 that may be compiled to regenerate object code. Accordingly, as data is prioritized for backup queries, that prioritization reflects the importance of data and changes in data from previous backups.
  • the change index 124 lists any data that has changed since an immediately prior backup that are to be backed up in any emergency backup. Thus, the change index 124 allows a system administrator or the user responsible for maintaining the emergency backup process to minimize the amount of critical data that must be handled during an emergency situation. Accordingly, for other types of backups the change index 124 may be omitted.
  • the classifier module 118 creates and maintains the database structure 120 . So, periodically, the classifier module 118 checks for sensitivity marks, e.g., confidential, in preselected locations of a selected number of files maintained on the system. The marks may be located, for example, in a document header or at the end of the document. If the classifier module 118 finds such mark, it marks a file as sensitive. The classifier module also is able to identify files falling in other priority index 122 categories such as unopened e-mail and marks those files accordingly.
  • sensitivity marks e.g., confidential
  • the security labeling 126 allows sensitive or proprietary data to be identified and handled appropriately. If sensitive information is included, then, preferably, if time allows the sensitive data is encrypted prior to backup. Accordingly, in an emergency situation, the time required to encrypt the data is estimated and, if sufficient time is deemed available prior to the impending disaster, the sensitive data is encrypted and the encrypted data is backed up. If it is determined that sufficient time is not available, then, depending upon the data sensitivity and cost of recovery, its destruction may be allowed or, it may be transferred unencrypted. It should also be noted that, if sufficient time is available, data may be compressed to reduce emergency backup transfer time.
  • the classifier module 118 may be configured to determine whether stored data contains image data as well as text. Thus, since image data is typically more voluminous than textual data and so, requires a higher transmission and storage capacity, the classifier module may assign the text a higher priority than the image data. By prioritizing the data such that the backup protects the textual data first, the likelihood of backing up all of the textual data is increased, where otherwise, the backup could be interrupted during transmission of the first image, frustrating protection even of that first image.
  • the classifier module 118 may be configured to identify local backup copies that may be discarded and, so, are not transmitted. For example, word processors automatically make backup copies that need not be preserved to maintain an adequate system snapshot. Further, backup copies of graphics or image are often maintained elsewhere, automatically. Thus, the classifier module 118 , preferably, places a lower priority for backing up timed backup copies, first sending the original text or graphic files.
  • Each preferred embodiment emergency network includes a database model of anticipated disasters 138 , preferably, in the backup server.
  • the database model 138 receives various environmental disaster-related parameters 140 , e.g. from the sensors 114 .
  • these parameters 140 may indicate the rate of expansion of the fire, general weather conditions (whether it is windy, rainy, etc.) and the size of the disaster area or of building 106 .
  • an initial emergency network map 128 is included that may be based, initially, upon a prior emergency or a response to an anticipated emergency.
  • the initial emergency network map 128 may be a representation of a network in four adjacent rooms 142 , 144 , 146 and 148 .
  • connected computers 150 are located in rooms 142 and 144 with network connections represented by arrows.
  • the network mapper upon receiving the database model 138 , environmental parameters 140 and updated sensor 114 information uses the information to modify the initial emergency network map 128 reconnecting computers 152 to form the backup network of updated emergency network map 128 ′.
  • map 128 ′ arrows represent data flow within the network during an emergency backup initiated for room 142 .
  • the emergency backup network may be, for example, a local area network, a telephone network, a radio network, a wireless network or a combination thereof. Further, the backup may be made over what is commonly referred to as the internet or over an intranet or an extranet.
  • the emergency backup map 128 ′ may include a schedule for selecting which devices are to be connected to which channels, what the capacities of each channel should be, protocol for copying data in accordance with previously established priorities and to what devices the data should be copied. Further, the channels are created on the fly, individually, by devices in the process of communicating with other devices during the emergency.
  • the protocol governing the creation of the backup channels may include device priority, relative danger of data loss, and similarity of memory capacity.
  • the newly connected computers 152 may include, for example, one or more of each of what is commonly referred to as a personal computer (PC), a server, a mainframe, an embedded device or processor, a PDA, a web phone, a smart wallet, a digital pen or a digital camera.
  • Small embedded devices with relatively little local memory that are connected to the network such as, for example, a smart telephone or a digital watch, depend exclusively on the global backup service from the server 116 for emergency backup.
  • the server providing the global backup service may be one or more local computers located in a close proximity to embedded devices. During an emergency, data is transferred from the embedded devices to the local computer and, then, from the local computer, the data is backed up, either locally or globally across a backup network.
  • the backup network is not intended to restrict the backup network to a collection of computers 152 operating normally as networked computers such as the network 100 shown in the example of FIG. 1 .
  • the computers are dynamically connectable to a backup network wherein computers 152 within the danger zone 142 are connected to a computer or computers 152 outside of the danger zone 142 or in a safe zone.
  • These other computers 152 may be located in locations 144 , 146 , 148 at which no emergency signals are detected, at a central remote backup server, or at a previously identified a temporary, remote backup server.
  • computers having sufficient storage to store endangered data are identified outside of the danger zone 142 in a safe zone.
  • FIG. 3 is a flow diagram of the preferred embodiment emergency backup process 160 .
  • sensors 114 After sensing an emergency situation, sensors 114 generate emergency signals. Areas 142 within a previously identified distance from the alarms are identified as being emergency zones, with remaining areas 144 , 146 , 148 being non-emergency zones and identified as such in step 164 .
  • each individual computer system 152 maintains its own map or list of connectable systems. From this map 128 the emergency back up network 128 ′ is created, dynamically.
  • each system 152 also includes responses to various environmental parameters 140 and disaster types such that the system may respond appropriately based upon the type and severity of the danger.
  • each device 110 or system 102 in an identified emergency location 106 attempts to establish connection with devices 112 or systems 104 in non-emergency locations 108 .
  • step 168 priority is assigned according to the previously established device priority stored in the priority index 122 of the database 120 and, then, the data is transferred for backup according to that established priority.
  • a preliminary estimate is made regarding the amount of data to be sent and the availability of storage at non-emergency locations.
  • the time available for transfer is estimated, depending upon any available information about the characteristics of the emergency.
  • data in those devices identified as being in the greatest danger are passed to devices 104 , 112 in non-emergency locations 108 first. Then, data not previously backed up or recently changed data, since the previous backup for example, are passed from devices 102 , 110 in emergency locations 106 to devices 104 , 112 in non-emergency locations 108 .
  • step 170 secured data is encrypted prior to backup and in step 172 , the encrypted data is backed up.
  • step 172 the emergency area is checked to determine whether the danger zone has spread.
  • step 174 if the emergency has spread, devices in newly endangered locations are backed up. These new locations may include devices that had previously received backup data from other, initially endangered devices. Further, during this additional backup, these newly endangered devices also start to organize other more remote devices on the backup network or devices in a central service outside of the immediate emergency area.
  • computers 180 in the safe zone 182 may override the receiving points defined in the emergency backup map 184 , electing to receive backup data from computers 186 in the danger zone 188 . Accordingly, when emergency backup network computers 180 in the safe zones 182 receive a backup request from one or more endangered computers 186 , the computers 180 in the safe zone 182 share the request and any corresponding information, e.g., the amount and type of data to be backed up as well as the severity of the emergency situation. At that point, the computer (not shown) identified in the emergency network map 184 may begin to receive the backup data or, another computer in safe zone 182 , more suited to the amount and type of data being transferred or the speed of the transfer may be substituted. As the data is transferred, it may be forwarded to a global backup server (not shown) or to some other computer on the backup network, to make space on the receiving computer in safe zone 182 , if necessary.
  • a global backup server not shown

Abstract

An emergency backup system, method and computer program product for backing up data on one or more computers located in an identified danger zone. When an emergency occurs, computers in the danger zone are connected to a network. The computers may be distributed at various remote locations. The protected locations each include a sensor for sensing an emergency situation and signaling the local computer of an impending emergency. The sensor also signals remote computers of the occurrence of the emergency. The computers may have been connected together over a network or, upon receiving an emergency signal, may connect together into a backup network. Local computers in the danger zone are connected across the network to remote computers with sufficient available storage to backup data from a connected local computer. The backup may be a full backup, a partial backup or a selective backup. The computers may include PCs, PDAs and servers. The network may be a LAN, a wireless network, a phone network or a WAN.

Description

BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention is related to disaster recovery and, more particularly, to disaster recovery for computer systems and methods therefor.
2. Background Description
During an emergency information stored, maintained or in use on a computer may be lost. Such information may be the result of days or even weeks of work and, therefore, may be very valuable. So, surge protectors are used to protect computers from a power surge. An emergency universal power supply (UPS) may be used to avoid losing data during a power failure. An UPS provides sufficient power to keep the system running after a power failure long enough to store data in nonvolatile storage located in the computer system and, then, conduct an orderly shut down. After the power failure, the data may be recovered, reloaded onto the computer and the computer may resume operation, where it left off prior to the power failure.
However, if an emergency arises that is more severe than a power failure, such as a fire, even the data normally stored in the computer's nonvolatile storage may be lost, permanently. If the data is lost completely, it must be regenerated to recover from the emergency. Typically, regenerating the data may require redoing previously done work and so, regenerating the data may take as long as it took to generate it initially and at nearly the same cost.
Accordingly, there is a need for disaster recovery for computer systems.
SUMMARY OF THE INVENTION
It is a purpose of the invention to improve computer system disaster recovery.
The present invention is an emergency backup system, method and computer program product for backing up data on one or more computers located in a danger zone. When an emergency occurs, the computers in the danger zone are connected to a backup network The computers may be distributed at various remote locations. Protected locations are locations that include a sensor for sensing an emergency situation and signaling local computers of the pending emergency. The sensor also signals remote computers of the emergency. The computers may have been connected together over a network or, upon receiving an emergency signal, may connect together into a backup network. Local computers in the danger zone arc connected across the network to remote computers that have sufficient available storage to backup data from the connected local computers. The backup may be a full backup, a partial backup or a selective backup. The computers may include PCs, PDAs and servers. The network may be a LAN, a wireless network, a phone network or a WAN.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing and other objects, aspects and advantages will be better understood from the following detailed description of a preferred embodiment of the invention with reference to the drawings, in which:
FIG. 1 shows a computer network wherein upon occurrence of an emergency condition, e.g. a fire or earthquake, computers within the zone of danger initiate backup of vulnerable data;
FIG. 2 represents an example of the preferred database structure;
FIG. 3 is a flow diagram of the preferred embodiment emergency backup process;
FIG. 4 is another embodiment wherein, computers in the safe zone can override the receiving points defined in the emergency backup map.
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION
Referring now to the drawings and, more particularly, FIG. 1 shows a computer network 100 wherein upon occurrence of an emergency condition, e.g. a fire or earthquake, computers within the zone of danger initiate backup of vulnerable data. The network 100 may be, for example only, a local area network (LA, a wireless network, a phone network or a wide area network (WAN). The network 100 includes multiple connected computers 102, 104, 116 distributed, for example, in different rooms, 106, 108 or in different buildings. The computers 102, 104, 116 may include, for example, one or more servers 116 and one or more personal computers 102, 104. The network 100 may also include connected hand held computers 110, 112 such as those commonly referred to as personal digital assistants (PDAs). A remote sensor 114 is located in at least one room 106 to sense and signal the occurrence of an emergency condition, e.g. a fire or earthquake. A server 116 may also be connected to the network 100 for additional back up resources and to maintain a disaster center database that includes disaster response models. A disaster response model is a model of a disaster or of a prior emergency situation paired with a preselected response for such an anticipated disaster.
Upon sensing an emergency, the sensor 114 sends a signal to vulnerable computers 102, 110 in the danger zone, room 106 in this example. The signal is further transmitted either directly or indirectly to computers 104, 112 and server 116 in safe areas outside of the danger zone. If the transmission is direct, the signal is transmitted to receivers in the remote computers 104, 112. If the transmission is indirect, then the signal is transmitted by computers 102, 110 over the network 100 to the remote computers 104, 112.
Upon receiving the signal, each endangered computer 102, 110 initiates a backup process, to backup data stored, for example, in files or databases in the computers 102, 110. The type of backup done in an emergency is pre-selected by the system administrator or owner. Accordingly, the backup may be, for example, a full backup wherein all data, e.g., the entire database, is backed up, a partial backup wherein only previously identified data or data changed since the last backup is backed up, or a selective backup wherein previously selected data is backed up.
The emergency sensor 114 may be, for example, a fire detector, an earthquake detector, a water sensor, an air pressure sensor, a pressure sensor, a smell sensor, a heat detector or sensor. The emergency signal sent by the sensor may be an audio signal, a radio signal or, an electrical signal sent over an electrical line connected from the sensor 114 to the computer 102. Further, if audio signal, such as a fire alarm, an earthquake alarm, a flood alarm or a volcano alarm, are employed the computers 102, 110 are equipped to recognize the audible alarm.
FIG. 2 shows an example of the organization of one of the intended backup computers, e.g., server 116, which includes a classifier module 118 that generates a database 120 having the preferred structure. Upon a sensor 114 sensing an emergency situation, information in the database 120 is passed to a network mapper 121 in server 116 to direct formation of an emergency backup network 100. In this example, the classifier module 118, which is linked to other network databases (not shown), creates a database structure 120 that includes a priority index 122, a change index 124, security labeling 126 and an emergency network map 128.
It should be noted that two types of backup services may be employed for the preferred embodiment system. First, a global backup service may employ the server 116 to provide backup coverage of multiple connected computers, e.g., 102, 110. Additionally, some of the computers 102, 110 may include a local backup service. Each local backup service, which may be included on some or all local computers or embedded devices, is structured like the service structure of FIG. 2, but provides coverage only for local data located on the same local computer, instead of providing emergency backup for all computers in the danger zone. For a system with a local backup service, emergency network map 128 points only to potential connections between the local computer and other computers that might serve as backup computers, where the locally backed up data may be sent.
Accordingly, such local emergency backup services require that the computer upon which the local service resides have sufficient memory to handle the backup and sufficient storage available to backup tie data. This local backup service has some advantages over a direct link to a global backup server because, during an emergency backup, network contact with an outside global backup server may be lost, which could disrupt the emergency global backup. A computer including such a local backup scheme is configured similar to FIG. 2. Therefore, no additional description is required.
Returning to FIG. 2, the priority index 122 of database 120 has a structure that may include, for example, a list 130 of sensitive data that is most likely to be lost; unopened e-mail 132, as well as previously opened but retained e-mail; data 134 that has been previously identified by a user for backup; and source code 136 that may be compiled to regenerate object code. Accordingly, as data is prioritized for backup queries, that prioritization reflects the importance of data and changes in data from previous backups.
The change index 124 lists any data that has changed since an immediately prior backup that are to be backed up in any emergency backup. Thus, the change index 124 allows a system administrator or the user responsible for maintaining the emergency backup process to minimize the amount of critical data that must be handled during an emergency situation. Accordingly, for other types of backups the change index 124 may be omitted.
The classifier module 118 creates and maintains the database structure 120. So, periodically, the classifier module 118 checks for sensitivity marks, e.g., confidential, in preselected locations of a selected number of files maintained on the system. The marks may be located, for example, in a document header or at the end of the document. If the classifier module 118 finds such mark, it marks a file as sensitive. The classifier module also is able to identify files falling in other priority index 122 categories such as unopened e-mail and marks those files accordingly.
The security labeling 126 allows sensitive or proprietary data to be identified and handled appropriately. If sensitive information is included, then, preferably, if time allows the sensitive data is encrypted prior to backup. Accordingly, in an emergency situation, the time required to encrypt the data is estimated and, if sufficient time is deemed available prior to the impending disaster, the sensitive data is encrypted and the encrypted data is backed up. If it is determined that sufficient time is not available, then, depending upon the data sensitivity and cost of recovery, its destruction may be allowed or, it may be transferred unencrypted. It should also be noted that, if sufficient time is available, data may be compressed to reduce emergency backup transfer time.
Optionally, the classifier module 118 may be configured to determine whether stored data contains image data as well as text. Thus, since image data is typically more voluminous than textual data and so, requires a higher transmission and storage capacity, the classifier module may assign the text a higher priority than the image data. By prioritizing the data such that the backup protects the textual data first, the likelihood of backing up all of the textual data is increased, where otherwise, the backup could be interrupted during transmission of the first image, frustrating protection even of that first image.
Further, the classifier module 118 may be configured to identify local backup copies that may be discarded and, so, are not transmitted. For example, word processors automatically make backup copies that need not be preserved to maintain an adequate system snapshot. Further, backup copies of graphics or image are often maintained elsewhere, automatically. Thus, the classifier module 118, preferably, places a lower priority for backing up timed backup copies, first sending the original text or graphic files.
Each preferred embodiment emergency network includes a database model of anticipated disasters 138, preferably, in the backup server. The database model 138 receives various environmental disaster-related parameters 140, e.g. from the sensors 114. For example, for a fire in building 106, these parameters 140 may indicate the rate of expansion of the fire, general weather conditions (whether it is windy, rainy, etc.) and the size of the disaster area or of building 106.
Finally, an initial emergency network map 128 is included that may be based, initially, upon a prior emergency or a response to an anticipated emergency. For example, the initial emergency network map 128 may be a representation of a network in four adjacent rooms 142, 144, 146 and 148. In the initial emergency backup network map 128 connected computers 150 are located in rooms 142 and 144 with network connections represented by arrows. The network mapper, upon receiving the database model 138, environmental parameters 140 and updated sensor 114 information uses the information to modify the initial emergency network map 128 reconnecting computers 152 to form the backup network of updated emergency network map 128′.
So, in the updated emergency backup network map 128′ arrows represent data flow within the network during an emergency backup initiated for room 142. The emergency backup network may be, for example, a local area network, a telephone network, a radio network, a wireless network or a combination thereof. Further, the backup may be made over what is commonly referred to as the internet or over an intranet or an extranet.
Additionally, the emergency backup map 128′ may include a schedule for selecting which devices are to be connected to which channels, what the capacities of each channel should be, protocol for copying data in accordance with previously established priorities and to what devices the data should be copied. Further, the channels are created on the fly, individually, by devices in the process of communicating with other devices during the emergency. The protocol governing the creation of the backup channels may include device priority, relative danger of data loss, and similarity of memory capacity.
The newly connected computers 152 may include, for example, one or more of each of what is commonly referred to as a personal computer (PC), a server, a mainframe, an embedded device or processor, a PDA, a web phone, a smart wallet, a digital pen or a digital camera. Small embedded devices with relatively little local memory that are connected to the network such as, for example, a smart telephone or a digital watch, depend exclusively on the global backup service from the server 116 for emergency backup. Further, for these small embedded devices the server providing the global backup service may be one or more local computers located in a close proximity to embedded devices. During an emergency, data is transferred from the embedded devices to the local computer and, then, from the local computer, the data is backed up, either locally or globally across a backup network.
It is not intended to restrict the backup network to a collection of computers 152 operating normally as networked computers such as the network 100 shown in the example of FIG. 1. Instead, preferably, the computers are dynamically connectable to a backup network wherein computers 152 within the danger zone 142 are connected to a computer or computers 152 outside of the danger zone 142 or in a safe zone. These other computers 152 may be located in locations 144, 146, 148 at which no emergency signals are detected, at a central remote backup server, or at a previously identified a temporary, remote backup server. Further, when emergency situation is recognized and the preferred backup process is initiated, computers having sufficient storage to store endangered data are identified outside of the danger zone 142 in a safe zone.
Thus, FIG. 3 is a flow diagram of the preferred embodiment emergency backup process 160. First, in step 162, after sensing an emergency situation, sensors 114 generate emergency signals. Areas 142 within a previously identified distance from the alarms are identified as being emergency zones, with remaining areas 144, 146, 148 being non-emergency zones and identified as such in step 164. Preferably, each individual computer system 152 maintains its own map or list of connectable systems. From this map 128 the emergency back up network 128′ is created, dynamically. Preferably, each system 152, also includes responses to various environmental parameters 140 and disaster types such that the system may respond appropriately based upon the type and severity of the danger.
The actual system response depends upon the type of emergency alarm received. An earthquake causes the backup network to include computers in other cities or states. A flash flood or other water hazard causes the backup network to include systems on higher floors of the same building to be included. A fire in one room causes the first backup network 128′ to include systems in another room. If the fire spreads to that room, the situation is reassessed and the backup network expands, dynamically, to include other buildings. Thus, in step 166, each device 110 or system 102 in an identified emergency location 106 attempts to establish connection with devices 112 or systems 104 in non-emergency locations 108.
Preferably, in step 168, priority is assigned according to the previously established device priority stored in the priority index 122 of the database 120 and, then, the data is transferred for backup according to that established priority. A preliminary estimate is made regarding the amount of data to be sent and the availability of storage at non-emergency locations. Also, the time available for transfer is estimated, depending upon any available information about the characteristics of the emergency. Further, if possible, data in those devices identified as being in the greatest danger are passed to devices 104, 112 in non-emergency locations 108 first. Then, data not previously backed up or recently changed data, since the previous backup for example, are passed from devices 102, 110 in emergency locations 106 to devices 104, 112 in non-emergency locations 108.
Then, in step 170, secured data is encrypted prior to backup and in step 172, the encrypted data is backed up. Finally, since in any emergency situation such as a fire, the danger may spread beyond the initial danger zone, the emergency area is checked to determine whether the danger zone has spread. In step 174, if the emergency has spread, devices in newly endangered locations are backed up. These new locations may include devices that had previously received backup data from other, initially endangered devices. Further, during this additional backup, these newly endangered devices also start to organize other more remote devices on the backup network or devices in a central service outside of the immediate emergency area.
Optionally, as represented in FIG. 4, computers 180 in the safe zone 182 may override the receiving points defined in the emergency backup map 184, electing to receive backup data from computers 186 in the danger zone 188. Accordingly, when emergency backup network computers 180 in the safe zones 182 receive a backup request from one or more endangered computers 186, the computers 180 in the safe zone 182 share the request and any corresponding information, e.g., the amount and type of data to be backed up as well as the severity of the emergency situation. At that point, the computer (not shown) identified in the emergency network map 184 may begin to receive the backup data or, another computer in safe zone 182, more suited to the amount and type of data being transferred or the speed of the transfer may be substituted. As the data is transferred, it may be forwarded to a global backup server (not shown) or to some other computer on the backup network, to make space on the receiving computer in safe zone 182, if necessary.
While the invention has been described in terms of preferred embodiments, those skilled in the art will recognize that the invention can be practiced with modification within the spirit and scope of the appended claims.

Claims (28)

We claim:
1. An emergency backup system for backing up data on one or more computers located in an identified danger zone, said backup system comprising:
a network of computers at distributed locations;
at least one sensor at one or more of said locations coupled to at least one local computer connected to said network, said sensor sensing the occurrence of an emergency and transmitting an emergency signal in response to said sensed emergency; and
at least one receiver at a remote location coupled to a remote computer connected to said network, said receiver receiving said emergency signal, said remote computer having sufficient available storage to store selected data from said local computer, said local computer transferring data to said remote computer further in response to said emergency signal.
2. An emergency backup system as in claim 1, wherein each said at least one sensor is selected from the group consisting of fire detectors,earthquake detectors, water sensors, air pressure sensors, pressure sensors, smell sensors and heat sensors.
3. An emergency backup system as in claim 1, wherein the transmitted emergency signal is selected from the group consisting of a fire alarm, an earthquake alarm, a flood alarm and a volcano alarm.
4. An emergency backup system as in claim 1, wherein all data stored on said local computer is transferred to said remote computer.
5. An emergency backup system as in claim 1, wherein all data determined to have changed since a last backup is transferred to said remote computer.
6. An emergency backup system as in claim 1, wherein said network is a backup network, said computers being connected together upon receiving said emergency signal to form said backup network.
7. An emergency backup system as in claim 6, wherein said network of computers includes a mainframe computer.
8. An emergency backup system as in claim 6, wherein said network of computers includes a handheld computer.
9. An emergency backup system as in claim 6, wherein said network of computers includes a network server.
10. An emergency backup system as in claim 6 wherein said network of computers includes one or more personal computers.
11. An emergency backup system as in claim 10, wherein at least one of said personal computers includes local storage for backing up data locally on said at least one personal computer in response to said emergency signal.
12. A emergency backup system for backing up data on one or more computers located in an identified danger zone, said backup system comprising:
means for coupling a plurality of computers together, each of said plurality of computers being located at one of two or more locations;
sensing means at one or more of said locations coupled to at least one local computer, said sensing means for sensing an emergency and transmitting an emergency signal in response to said sensed emergency;
receiving means for receiving said emergency signal at a remote location, said receiving means coupled to a remote computer;
data storage means for storing backup data at said remote computer;
data selection means for selecting data being stored at said local computer by said data storage means; and
means for transferring selected data to said remote computer from said local computer in response to said emergency signal.
13. An emergency backup system as in claim 12, wherein the means for coupling the plurality of computers together comprises means for forming a wireless network.
14. An emergency backup system as in claim 12, wherein the means for coupling the plurality of computers together connects the computers together to form a local area network.
15. An emergency backup system as in claim 12, wherein the data selection means comprises prioritization means for prioritizing data for backup.
16. An emergency backup system as in claim 15, wherein the prioritization means prioritizes data according to data sensitivity.
17. An emergency backup system as in claim 15, further comprising:
means for establishing an emergency data backup protocol.
18. An emergency backup system as in claim 17, wherein the emergency data backup protocol comprises:
a schedule for device to channel connection;
a capacity schedule of each connected channel; and
a destination computer for data being backed up.
19. An emergency backup system as in claim 17, further comprising:
encryption means for encrypting sensitive data.
20. An emergency backup system as in claim 19, wherein the encryption means includes means for estimating a time to encrypt data.
21. A disaster recovery method comprising the steps of:
a) transmitting an emergency signal in response to an identified danger;
b) for each device within an identified danger zone, establishing a connection with at least one other device not within said danger zone;
c) transferring data from said each device in said identified danger zone to said at least one other device, said data being stored temporarily at said other device for subsequent recovery;
d) encrypting identified secured data; and
e) copying said encrypted data.
22. A disaster recovery method as in claim 21, wherein prior to encrypting data, an estimation is made of the time for said encryption.
23. A disaster recovery method as in claim 21, further comprising the step of:
f) determining if said identified danger extends to locations not previously identified as being in said danger zone and repeating steps a-e for any devices in determined extended danger zone locations.
24. A disaster recovery method as in claim 23, wherein in the step (b) of establishing the connection to a device not in said danger zone, establishes said connection to corresponding devices not in said danger zone responsive to a maximum amount of data to be transferred, a rate of data transfer and the determined likelihood of destruction of data in each of said corresponding devices.
25. A disaster recovery method as in claim 23 wherein, in the step (b) of establishing the connection to a device not in said danger zone, the connected device overrides an initial selection.
26. A computer program product for disaster recovery of data stored locally in one or more computers, having a computer readable medium with computer readable program code stored thereon, said computer readable program code comprising:
computer readable program code means for transmitting an emergency signal in response to an identified danger;
computer readable program code means for establishing a connection between each device located in an identified danger zone with at least one other device not within said danger zone;
computer readable program code means for transferring data from said each device in said identified danger zone to said at least one other device, said data being stored temporarily at said other device for subsequent recovery;
computer readable program code means for encrypting data identified as being secured data; and
computer readable program code means for transferring said encrypted data.
27. A computer program product for disaster recovery of claim 26, having a computer readable medium with computer readable program code stored thereon, said computer readable program code further comprising:
computer readable program code means for determining if said identified danger extends to locations not previously identified as being in said danger zone and backing up data for any devices in determined extended danger zone locations.
28. A computer program product for disaster recovery of claim 26, having a computer readable medium with computer readable program code stored thereon, said computer readable program code further comprising:
computer readable program code means for means for establishing the connection between devices establishes said connection from said each device to a corresponding device in said danger zone responsive to a maximum amount of data to be transferred, a rate of data transfer and the determined likelihood of destruction of data in each of said corresponding devices.
US09/369,783 1999-08-06 1999-08-06 Emergency backup system, method and program product therefor Expired - Lifetime US6496949B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/369,783 US6496949B1 (en) 1999-08-06 1999-08-06 Emergency backup system, method and program product therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/369,783 US6496949B1 (en) 1999-08-06 1999-08-06 Emergency backup system, method and program product therefor

Publications (1)

Publication Number Publication Date
US6496949B1 true US6496949B1 (en) 2002-12-17

Family

ID=23456900

Family Applications (1)

Application Number Title Priority Date Filing Date
US09/369,783 Expired - Lifetime US6496949B1 (en) 1999-08-06 1999-08-06 Emergency backup system, method and program product therefor

Country Status (1)

Country Link
US (1) US6496949B1 (en)

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020072350A1 (en) * 2000-12-08 2002-06-13 Atsushi Fukuzato Backup method of applications of portable cellular phone
US20020081995A1 (en) * 2000-12-21 2002-06-27 Mika Leppinen Secure wireless backup mechanism
US20020184239A1 (en) * 2001-06-01 2002-12-05 Malcolm Mosher System and method for replication of distributed databases that span multiple primary nodes
US20030023673A1 (en) * 2001-07-05 2003-01-30 Frank Tso Auto-backup system and method for portable electronic device
US20030037247A1 (en) * 2000-05-23 2003-02-20 Kiyohiro Obara Computing system and data decryption method and computer system with remote copy facility
US20030076835A1 (en) * 2001-10-23 2003-04-24 Lund Sven O. Method and apparatus to configure a digital subscriber line device
US20030101136A1 (en) * 2000-08-04 2003-05-29 First Data Corporation Managing Account Database in ABDS System
US6658374B2 (en) * 2000-04-17 2003-12-02 Sony Corporation Maintenance support system for electronic apparatus
US6704885B1 (en) * 2000-07-28 2004-03-09 Oracle International Corporation Performing data backups with a stochastic scheduler in a distributed computing environment
WO2004028066A2 (en) * 2002-09-20 2004-04-01 Tekelec Methods and systems for locating redundant telephony call processing hosts in geographically separate locations
US20040068386A1 (en) * 2002-10-03 2004-04-08 Smith Kevin H. System and method for protection of active files during extreme conditions
US20040068388A1 (en) * 2002-10-03 2004-04-08 Smith Kevin H. System and method for protection of equipment during motion anomalies
US20040124975A1 (en) * 2002-12-27 2004-07-01 Kabushiki Kaisha Toshiba Electronic apparatus and data processing method
US20040153701A1 (en) * 2002-12-31 2004-08-05 Pickell John D. System and method for controlling redundant communication links in networked safety systems
US20050028026A1 (en) * 2003-07-28 2005-02-03 Microsoft Corporation Method and system for backing up and restoring data of a node in a distributed system
US20050049732A1 (en) * 2003-08-29 2005-03-03 Dimitri Kanevsky Method and apparatus for computer communication using audio signals
US20050137983A1 (en) * 2003-12-18 2005-06-23 Matthew Bells System and method for digital rights management
US20050240595A1 (en) * 2004-04-26 2005-10-27 Sashikanth Chandrasekaran Dynamic redistribution of a distributed memory index when individual nodes have different lookup indexes
US20060014125A1 (en) * 2004-07-14 2006-01-19 St Clair John Q Walking through walls training system
US20060053177A1 (en) * 2004-09-07 2006-03-09 Riku Suomela System and method for backup and restoration
US20060080404A1 (en) * 2002-06-19 2006-04-13 Knut Haber-Land-Schlosser Method and device for generating a mobile homepage in accordance with context related information
US20060149799A1 (en) * 2001-09-28 2006-07-06 Lik Wong Techniques for making a replica of a group of database objects
US20060237575A1 (en) * 2005-04-25 2006-10-26 Van Hierden J E Portable volleyball net and supports
US20060288183A1 (en) * 2003-10-13 2006-12-21 Yoav Boaz Apparatus and method for information recovery quality assessment in a computer system
WO2007030553A2 (en) * 2005-09-08 2007-03-15 Interdigital Technology Corporation Method and apparatus for processing data in a wireless communication system
US7203861B1 (en) * 2000-03-08 2007-04-10 Cablynx, Inc. Method and system for remotely backing up a computer memory utilizing a global communications network
US20070098019A1 (en) * 2003-06-25 2007-05-03 Koninklijke Philips Electronics, N.V. Automatic and selective backup system on a home network
US20070233865A1 (en) * 2006-03-30 2007-10-04 Garbow Zachary A Dynamically Adjusting Operating Level of Server Processing Responsive to Detection of Failure at a Server
US20070233746A1 (en) * 2006-03-30 2007-10-04 Garbow Zachary A Transitioning of Database Service Responsibility Responsive to Server Failure in a Partially Clustered Computing Environment
EP1868096A1 (en) 2006-06-14 2007-12-19 Vodafone Holding GmbH Method and system for handling persistent data, Protocol for communication between a computer and a persistent storage unit
US20080114827A1 (en) * 2006-11-10 2008-05-15 Microsoft Corporation Message forwarding backup manager in a distributed server system
US20080141040A1 (en) * 2006-12-08 2008-06-12 Microsoft Corporation Secure data protection during disasters
US20080196044A1 (en) * 1999-11-29 2008-08-14 Stanley Randy P Automatically enabling information to be displayed after a processor-based system is turned off
US7447786B2 (en) 2003-05-09 2008-11-04 Oracle International Corporation Efficient locking of shared data that is accessed for reads in a cluster database
EP2003842A1 (en) * 2007-06-15 2008-12-17 Research In Motion Limited A method and devices for providing secure data backup form a mobile communication device to an external computing device
US20080310633A1 (en) * 2007-06-15 2008-12-18 Research In Motion Limited Method and devices for providing secure data backup from a mobile communication device to an external computing device
US20080320319A1 (en) * 2006-12-29 2008-12-25 Muller Marcus S System and method for encrypting secondary copies of data
US20090037442A1 (en) * 2007-07-31 2009-02-05 Jun Yuan Reconfiguring Propagation Streams in Distributed Information Sharing
US20090037553A1 (en) * 2007-07-31 2009-02-05 Jun Yuan Configuring or Reconfiguring a Multi-Master Information Sharing Environment
US7509381B1 (en) * 2008-04-21 2009-03-24 International Business Machines Corporation Adaptive email in-basket ordering
WO2006083329A3 (en) * 2005-02-02 2009-04-23 Carrier Corp Refrigerating system with economizing cycle
US20090196234A1 (en) * 2004-05-28 2009-08-06 Bae Systems Information And Electronic Systems Integration Inc. Method And Apparatus For Persistent Communications, Interoperability And Situational Awareness In The Aftermath Of A Disaster
DE102008047532B3 (en) * 2008-09-16 2010-03-11 Vodafone Holding Gmbh Data selecting device for use in e.g. mobile telephone, has transfer unit transmitting data units to memory unit if sending duration is smaller than maximum duration, and selected data elements to memory unit
US7725748B1 (en) 2000-12-29 2010-05-25 Intel Corporation Low power subsystem for portable computers
US7840992B1 (en) 2006-09-28 2010-11-23 Emc Corporation System and method for environmentally aware data protection
JP2012133746A (en) * 2010-12-20 2012-07-12 Lsi Corp Data manipulation during memory backup
US8341121B1 (en) * 2007-09-28 2012-12-25 Emc Corporation Imminent failure prioritized backup
US8345695B1 (en) 2008-06-17 2013-01-01 United Services Automobile Association (Usaa) Systems and methods for implementing network gateway in catastrophe context or the like
US8375005B1 (en) 2007-03-31 2013-02-12 Emc Corporation Rapid restore
US8463798B1 (en) 2007-03-31 2013-06-11 Emc Corporation Prioritized restore
US8583601B1 (en) 2007-09-28 2013-11-12 Emc Corporation Imminent failure backup
US20140019418A1 (en) * 2012-07-13 2014-01-16 International Business Machines Corporation Preventing mobile communication device data loss
FR2994291A1 (en) * 2012-07-31 2014-02-07 Jcp Method for emergency backup of data stored on e.g. computer server, in room of e.g. administrative building, involves sending event message to additional terminal by management unit upon reception of data transfer request
US8713376B1 (en) * 2011-12-27 2014-04-29 Symantec Corporation Escalating data backup protection in response to a failure in a cluster of nodes
US20140340223A1 (en) * 2012-09-27 2014-11-20 Emc Corporation Environmental alert for computer systems
US8924352B1 (en) 2007-03-31 2014-12-30 Emc Corporation Automated priority backup and archive
US20150082067A1 (en) * 2013-09-18 2015-03-19 Konica Minolta, Inc. Information processing apparatus and power-off control method of information processing apparaus
US9367702B2 (en) 2013-03-12 2016-06-14 Commvault Systems, Inc. Automatic file encryption
US9405928B2 (en) 2014-09-17 2016-08-02 Commvault Systems, Inc. Deriving encryption rules based on file content
US20170123671A1 (en) * 2015-10-28 2017-05-04 International Business Machines Corporation Selective Secure Deletion of Data in Distributed Systems and Cloud
US9785505B1 (en) * 2014-05-12 2017-10-10 Amazon Technologies, Inc. Communicative building management system for data loss prevention
US9793939B2 (en) 2015-08-05 2017-10-17 International Business Machines Corporation Automatic self-protection for a portable electronic device
US9883325B2 (en) 2013-12-12 2018-01-30 International Business Machines Corporation Cloud based emergency wireless link
US20190188089A1 (en) * 2017-12-18 2019-06-20 International Business Machines Corporation Forecast recommended backup destination
US10375116B2 (en) * 2012-03-02 2019-08-06 International Business Machines Corporation System and method to provide server control for access to mobile client data
US10785544B2 (en) 2016-10-10 2020-09-22 Hanwha Techwin Co., Ltd. Image acquisition apparatus with priority network selection for data upload
CN112714103A (en) * 2020-12-03 2021-04-27 南京暴走团电子商务有限公司 Safety control system based on network engineering
WO2021087332A1 (en) * 2019-10-30 2021-05-06 Momentum Dynamics Corporation Contactless swappable battery system
CN113742136A (en) * 2021-09-02 2021-12-03 瑞胜科信息(深圳)有限公司 Safety embedded system and intelligent backup and recovery method thereof
US11218458B2 (en) * 2019-10-15 2022-01-04 Dell Products, L.P. Modular data center that transfers workload to mitigate a detected physical threat
US11862987B2 (en) 2021-12-07 2024-01-02 Inductev Inc. Contactless swappable battery system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4514729A (en) * 1982-08-16 1985-04-30 Szarka Jay R Environmental control system and method
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US5889935A (en) * 1996-05-28 1999-03-30 Emc Corporation Disaster control features for remote data mirroring
US6049874A (en) * 1996-12-03 2000-04-11 Fairbanks Systems Group System and method for backing up computer files over a wide area computer network
US6049578A (en) * 1997-06-06 2000-04-11 Abb Combustion Engineering Nuclear Power, Inc. Digital plant protection system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4514729A (en) * 1982-08-16 1985-04-30 Szarka Jay R Environmental control system and method
US5889935A (en) * 1996-05-28 1999-03-30 Emc Corporation Disaster control features for remote data mirroring
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US6049874A (en) * 1996-12-03 2000-04-11 Fairbanks Systems Group System and method for backing up computer files over a wide area computer network
US6049578A (en) * 1997-06-06 2000-04-11 Abb Combustion Engineering Nuclear Power, Inc. Digital plant protection system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Remote Environmental Monitor for Unattended Computer Operations". IBM Technical Disclosure Bulletin:vol. No. 32, Issue No. 9A, p. 264-266. *

Cited By (138)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8793316B2 (en) 1999-11-29 2014-07-29 Intel Corporation Automatically enabling information to be displayed after a processor-based system is turned off
US20110208982A1 (en) * 1999-11-29 2011-08-25 Stanley Randy P Automatically enabling information to be displayed after a processor-based system is turned off
US20080196044A1 (en) * 1999-11-29 2008-08-14 Stanley Randy P Automatically enabling information to be displayed after a processor-based system is turned off
US10061369B2 (en) 1999-11-29 2018-08-28 Intel Corporation Automatically enabling information to be displayed after a processor-based system is turned off
US7203861B1 (en) * 2000-03-08 2007-04-10 Cablynx, Inc. Method and system for remotely backing up a computer memory utilizing a global communications network
US6658374B2 (en) * 2000-04-17 2003-12-02 Sony Corporation Maintenance support system for electronic apparatus
US6966001B2 (en) * 2000-05-23 2005-11-15 Hitachi, Ltd. Computing system and data decryption method and computer system with remote copy facility
US20030037247A1 (en) * 2000-05-23 2003-02-20 Kiyohiro Obara Computing system and data decryption method and computer system with remote copy facility
US6704885B1 (en) * 2000-07-28 2004-03-09 Oracle International Corporation Performing data backups with a stochastic scheduler in a distributed computing environment
US20030101136A1 (en) * 2000-08-04 2003-05-29 First Data Corporation Managing Account Database in ABDS System
US7187919B2 (en) * 2000-12-08 2007-03-06 Nec Corporation Backup method of applications of portable cellular phone
US20020072350A1 (en) * 2000-12-08 2002-06-13 Atsushi Fukuzato Backup method of applications of portable cellular phone
US6985719B2 (en) * 2000-12-21 2006-01-10 Nokia, Inc. Secure wireless backup mechanism
US20020081995A1 (en) * 2000-12-21 2002-06-27 Mika Leppinen Secure wireless backup mechanism
US7725748B1 (en) 2000-12-29 2010-05-25 Intel Corporation Low power subsystem for portable computers
US6785696B2 (en) * 2001-06-01 2004-08-31 Hewlett-Packard Development Company, L.P. System and method for replication of distributed databases that span multiple primary nodes
US20020184239A1 (en) * 2001-06-01 2002-12-05 Malcolm Mosher System and method for replication of distributed databases that span multiple primary nodes
US20030023673A1 (en) * 2001-07-05 2003-01-30 Frank Tso Auto-backup system and method for portable electronic device
US20060149799A1 (en) * 2001-09-28 2006-07-06 Lik Wong Techniques for making a replica of a group of database objects
US7801861B2 (en) * 2001-09-28 2010-09-21 Oracle International Corporation Techniques for replicating groups of database objects
US20060155789A1 (en) * 2001-09-28 2006-07-13 Lik Wong Techniques for replicating groups of database objects
US20030076835A1 (en) * 2001-10-23 2003-04-24 Lund Sven O. Method and apparatus to configure a digital subscriber line device
US20060080404A1 (en) * 2002-06-19 2006-04-13 Knut Haber-Land-Schlosser Method and device for generating a mobile homepage in accordance with context related information
WO2004028066A2 (en) * 2002-09-20 2004-04-01 Tekelec Methods and systems for locating redundant telephony call processing hosts in geographically separate locations
US8213299B2 (en) 2002-09-20 2012-07-03 Genband Us Llc Methods and systems for locating redundant telephony call processing hosts in geographically separate locations
US20040114578A1 (en) * 2002-09-20 2004-06-17 Tekelec Methods and systems for locating redundant telephony call processing hosts in geographically separate locations
WO2004028066A3 (en) * 2002-09-20 2004-04-29 Tekelec Us Methods and systems for locating redundant telephony call processing hosts in geographically separate locations
US6925409B2 (en) * 2002-10-03 2005-08-02 Hewlett-Packard Development Company, L.P. System and method for protection of active files during extreme conditions
US6879931B2 (en) * 2002-10-03 2005-04-12 Hewlett-Packard Development Company, L.P. System and method for protection of equipment during motion anomalies
US20040068388A1 (en) * 2002-10-03 2004-04-08 Smith Kevin H. System and method for protection of equipment during motion anomalies
US20040068386A1 (en) * 2002-10-03 2004-04-08 Smith Kevin H. System and method for protection of active files during extreme conditions
US20040124975A1 (en) * 2002-12-27 2004-07-01 Kabushiki Kaisha Toshiba Electronic apparatus and data processing method
US20040153701A1 (en) * 2002-12-31 2004-08-05 Pickell John D. System and method for controlling redundant communication links in networked safety systems
US7222256B2 (en) * 2002-12-31 2007-05-22 Honeywell International Inc. System and method for controlling redundant communication links in networked safety systems
US7447786B2 (en) 2003-05-09 2008-11-04 Oracle International Corporation Efficient locking of shared data that is accessed for reads in a cluster database
US20070098019A1 (en) * 2003-06-25 2007-05-03 Koninklijke Philips Electronics, N.V. Automatic and selective backup system on a home network
US20050028026A1 (en) * 2003-07-28 2005-02-03 Microsoft Corporation Method and system for backing up and restoring data of a node in a distributed system
US7249281B2 (en) * 2003-07-28 2007-07-24 Microsoft Corporation Method and system for backing up and restoring data of a node in a distributed system
US20090315687A1 (en) * 2003-08-29 2009-12-24 Dimitri Kanevsky Method and apparatus for computer communication using audio signals
US20050049732A1 (en) * 2003-08-29 2005-03-03 Dimitri Kanevsky Method and apparatus for computer communication using audio signals
US8054986B2 (en) * 2003-08-29 2011-11-08 International Business Machines Corporation Method and apparatus for computer communication using audio signals
US7706548B2 (en) * 2003-08-29 2010-04-27 International Business Machines Corporation Method and apparatus for computer communication using audio signals
US8244792B2 (en) 2003-10-13 2012-08-14 Emc (Benelux) B.V., S.A.R.L. Apparatus and method for information recovery quality assessment in a computer system
US20060288183A1 (en) * 2003-10-13 2006-12-21 Yoav Boaz Apparatus and method for information recovery quality assessment in a computer system
US20050137983A1 (en) * 2003-12-18 2005-06-23 Matthew Bells System and method for digital rights management
US20050240595A1 (en) * 2004-04-26 2005-10-27 Sashikanth Chandrasekaran Dynamic redistribution of a distributed memory index when individual nodes have different lookup indexes
US7962453B2 (en) 2004-04-26 2011-06-14 Oracle International Corporation Dynamic redistribution of a distributed memory index when individual nodes have different lookup indexes
US9426834B2 (en) 2004-05-28 2016-08-23 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for persistent communications, interoperability and situational awareness in the aftermath of a disaster
US9125041B2 (en) 2004-05-28 2015-09-01 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for persistent communications, interoperability and situational awareness in the aftermath of a disaster
US8681804B2 (en) * 2004-05-28 2014-03-25 Bae Systems Information And Electronic Systems Integration Inc. Method and apparatus for persistent communications, interoperability and situational awareness in the aftermath of a disaster
US20090196234A1 (en) * 2004-05-28 2009-08-06 Bae Systems Information And Electronic Systems Integration Inc. Method And Apparatus For Persistent Communications, Interoperability And Situational Awareness In The Aftermath Of A Disaster
US20060014125A1 (en) * 2004-07-14 2006-01-19 St Clair John Q Walking through walls training system
WO2006027653A1 (en) 2004-09-07 2006-03-16 Nokia Corporation System and method for backup and restoration
US20060053177A1 (en) * 2004-09-07 2006-03-09 Riku Suomela System and method for backup and restoration
US20140053002A1 (en) * 2004-11-15 2014-02-20 Commvault Systems, Inc. System and method for encrypting secondary copies of data
US9411986B2 (en) * 2004-11-15 2016-08-09 Commvault Systems, Inc. System and method for encrypting secondary copies of data
US9633232B2 (en) 2004-11-15 2017-04-25 Commvault Systems, Inc. System and method for encrypting secondary copies of data
WO2006083329A3 (en) * 2005-02-02 2009-04-23 Carrier Corp Refrigerating system with economizing cycle
AU2005326782C1 (en) * 2005-02-02 2011-06-09 Carrier Corporation Refrigerating system with economizing cycle
AU2005326782B2 (en) * 2005-02-02 2010-11-11 Carrier Corporation Refrigerating system with economizing cycle
US20060237575A1 (en) * 2005-04-25 2006-10-26 Van Hierden J E Portable volleyball net and supports
WO2007030553A3 (en) * 2005-09-08 2007-09-13 Interdigital Tech Corp Method and apparatus for processing data in a wireless communication system
US20070192585A1 (en) * 2005-09-08 2007-08-16 Interdigital Technology Corporation Method and apparatus for processing data in a wireless communication system
WO2007030553A2 (en) * 2005-09-08 2007-03-15 Interdigital Technology Corporation Method and apparatus for processing data in a wireless communication system
US8069139B2 (en) 2006-03-30 2011-11-29 International Business Machines Corporation Transitioning of database service responsibility responsive to server failure in a partially clustered computing environment
US20070233865A1 (en) * 2006-03-30 2007-10-04 Garbow Zachary A Dynamically Adjusting Operating Level of Server Processing Responsive to Detection of Failure at a Server
US20070233746A1 (en) * 2006-03-30 2007-10-04 Garbow Zachary A Transitioning of Database Service Responsibility Responsive to Server Failure in a Partially Clustered Computing Environment
US7496579B2 (en) * 2006-03-30 2009-02-24 International Business Machines Corporation Transitioning of database service responsibility responsive to server failure in a partially clustered computing environment
US20090119306A1 (en) * 2006-03-30 2009-05-07 International Business Machines Corporation Transitioning of database srvice responsibility responsive to server failure in a partially clustered computing environment
EP1868096A1 (en) 2006-06-14 2007-12-19 Vodafone Holding GmbH Method and system for handling persistent data, Protocol for communication between a computer and a persistent storage unit
US7840992B1 (en) 2006-09-28 2010-11-23 Emc Corporation System and method for environmentally aware data protection
US20080114827A1 (en) * 2006-11-10 2008-05-15 Microsoft Corporation Message forwarding backup manager in a distributed server system
US7685227B2 (en) 2006-11-10 2010-03-23 Gerber Robert H Message forwarding backup manager in a distributed server system
WO2008057649A1 (en) * 2006-11-10 2008-05-15 Microsoft Corporation Message forwarding backup manager in a distributed server system
US20080141040A1 (en) * 2006-12-08 2008-06-12 Microsoft Corporation Secure data protection during disasters
US8135135B2 (en) 2006-12-08 2012-03-13 Microsoft Corporation Secure data protection during disasters
US20080320319A1 (en) * 2006-12-29 2008-12-25 Muller Marcus S System and method for encrypting secondary copies of data
US20100031017A1 (en) * 2006-12-29 2010-02-04 Parag Gokhale System and method for encrypting secondary copies of data
US8510573B2 (en) * 2006-12-29 2013-08-13 Commvault Systems, Inc. System and method for encrypting secondary copies of data
US8775823B2 (en) 2006-12-29 2014-07-08 Commvault Systems, Inc. System and method for encrypting secondary copies of data
US8463798B1 (en) 2007-03-31 2013-06-11 Emc Corporation Prioritized restore
US8924352B1 (en) 2007-03-31 2014-12-30 Emc Corporation Automated priority backup and archive
US8375005B1 (en) 2007-03-31 2013-02-12 Emc Corporation Rapid restore
US9053330B2 (en) 2007-06-15 2015-06-09 Blackberry Limited Method and devices for providing secure data backup from a mobile communication device to an external computing device
US8484464B2 (en) 2007-06-15 2013-07-09 Research In Motion Limited Method and devices for providing secure data backup from a mobile communication device to an external computing device
US20080310633A1 (en) * 2007-06-15 2008-12-18 Research In Motion Limited Method and devices for providing secure data backup from a mobile communication device to an external computing device
US9594916B2 (en) 2007-06-15 2017-03-14 Blackberry Limited Method and devices for providing secure data backup from a mobile communication device to an external computing device
EP2003842A1 (en) * 2007-06-15 2008-12-17 Research In Motion Limited A method and devices for providing secure data backup form a mobile communication device to an external computing device
US7899785B2 (en) 2007-07-31 2011-03-01 Oracle International Corporation Reconfiguring propagation streams in distributed information sharing
US20090037553A1 (en) * 2007-07-31 2009-02-05 Jun Yuan Configuring or Reconfiguring a Multi-Master Information Sharing Environment
US20090037442A1 (en) * 2007-07-31 2009-02-05 Jun Yuan Reconfiguring Propagation Streams in Distributed Information Sharing
US7702741B2 (en) 2007-07-31 2010-04-20 Oracle International Corporation Configuring or reconfiguring a multi-master information sharing environment
US8583601B1 (en) 2007-09-28 2013-11-12 Emc Corporation Imminent failure backup
US8341121B1 (en) * 2007-09-28 2012-12-25 Emc Corporation Imminent failure prioritized backup
US7509381B1 (en) * 2008-04-21 2009-03-24 International Business Machines Corporation Adaptive email in-basket ordering
US8345695B1 (en) 2008-06-17 2013-01-01 United Services Automobile Association (Usaa) Systems and methods for implementing network gateway in catastrophe context or the like
US8934497B1 (en) 2008-06-17 2015-01-13 United Services Automobile Association Systems and methods for implementing network gateway in catastrophe context or the like
US10257235B1 (en) 2008-06-17 2019-04-09 United Services Automobile Association (Usaa) Systems and methods for implementing network gateway in catastrophe context or the like
EP2196907A3 (en) * 2008-09-16 2012-05-23 Vodafone Holding GmbH Device for selecting data for storage
DE102008047532B3 (en) * 2008-09-16 2010-03-11 Vodafone Holding Gmbh Data selecting device for use in e.g. mobile telephone, has transfer unit transmitting data units to memory unit if sending duration is smaller than maximum duration, and selected data elements to memory unit
JP2012133746A (en) * 2010-12-20 2012-07-12 Lsi Corp Data manipulation during memory backup
US8713376B1 (en) * 2011-12-27 2014-04-29 Symantec Corporation Escalating data backup protection in response to a failure in a cluster of nodes
US10375116B2 (en) * 2012-03-02 2019-08-06 International Business Machines Corporation System and method to provide server control for access to mobile client data
US20140019418A1 (en) * 2012-07-13 2014-01-16 International Business Machines Corporation Preventing mobile communication device data loss
US10085140B2 (en) * 2012-07-13 2018-09-25 International Business Machines Corporation Preventing mobile communication device data loss
FR2994291A1 (en) * 2012-07-31 2014-02-07 Jcp Method for emergency backup of data stored on e.g. computer server, in room of e.g. administrative building, involves sending event message to additional terminal by management unit upon reception of data transfer request
US20140340223A1 (en) * 2012-09-27 2014-11-20 Emc Corporation Environmental alert for computer systems
US9153122B2 (en) * 2012-09-27 2015-10-06 Emc Corporation Environmental alert for computer systems
US11928229B2 (en) 2013-03-12 2024-03-12 Commvault Systems, Inc. Automatic file encryption
US11042663B2 (en) 2013-03-12 2021-06-22 Commvault Systems, Inc. Automatic file encryption
US10445518B2 (en) 2013-03-12 2019-10-15 Commvault Systems, Inc. Automatic file encryption
US9734348B2 (en) 2013-03-12 2017-08-15 Commvault Systems, Inc. Automatic file encryption
US9367702B2 (en) 2013-03-12 2016-06-14 Commvault Systems, Inc. Automatic file encryption
US9483655B2 (en) 2013-03-12 2016-11-01 Commvault Systems, Inc. File backup with selective encryption
US9990512B2 (en) 2013-03-12 2018-06-05 Commvault Systems, Inc. File backup with selective encryption
US20150082067A1 (en) * 2013-09-18 2015-03-19 Konica Minolta, Inc. Information processing apparatus and power-off control method of information processing apparaus
US9886078B2 (en) * 2013-09-18 2018-02-06 Konica Minolta, Inc. Information processing apparatus and power-off control method of information processing apparaus
US9883325B2 (en) 2013-12-12 2018-01-30 International Business Machines Corporation Cloud based emergency wireless link
US9888338B2 (en) 2013-12-12 2018-02-06 International Business Machines Corporation Cloud based emergency wireless link
US9785505B1 (en) * 2014-05-12 2017-10-10 Amazon Technologies, Inc. Communicative building management system for data loss prevention
US9727491B2 (en) 2014-09-17 2017-08-08 Commvault Systems, Inc. Token-based encryption determination process
US9720849B2 (en) 2014-09-17 2017-08-01 Commvault Systems, Inc. Token-based encryption rule generation process
US9984006B2 (en) 2014-09-17 2018-05-29 Commvault Systems, Inc. Data storage systems and methods
US9405928B2 (en) 2014-09-17 2016-08-02 Commvault Systems, Inc. Deriving encryption rules based on file content
US10833718B2 (en) 2015-08-05 2020-11-10 International Business Machines Corporation Automatic self-protection for a portable electronic device
US9793939B2 (en) 2015-08-05 2017-10-17 International Business Machines Corporation Automatic self-protection for a portable electronic device
US20170123671A1 (en) * 2015-10-28 2017-05-04 International Business Machines Corporation Selective Secure Deletion of Data in Distributed Systems and Cloud
US10671325B2 (en) * 2015-10-28 2020-06-02 International Business Machines Corporation Selective secure deletion of data in distributed systems and cloud
US10785544B2 (en) 2016-10-10 2020-09-22 Hanwha Techwin Co., Ltd. Image acquisition apparatus with priority network selection for data upload
US20190188089A1 (en) * 2017-12-18 2019-06-20 International Business Machines Corporation Forecast recommended backup destination
US10671492B2 (en) * 2017-12-18 2020-06-02 International Business Machines Corporation Forecast recommended backup destination
US11218458B2 (en) * 2019-10-15 2022-01-04 Dell Products, L.P. Modular data center that transfers workload to mitigate a detected physical threat
WO2021087332A1 (en) * 2019-10-30 2021-05-06 Momentum Dynamics Corporation Contactless swappable battery system
US11689061B2 (en) 2019-10-30 2023-06-27 Inductev Inc. Contactless swappable battery system
CN112714103A (en) * 2020-12-03 2021-04-27 南京暴走团电子商务有限公司 Safety control system based on network engineering
CN113742136A (en) * 2021-09-02 2021-12-03 瑞胜科信息(深圳)有限公司 Safety embedded system and intelligent backup and recovery method thereof
CN113742136B (en) * 2021-09-02 2022-05-17 瑞胜科信息(深圳)有限公司 Intelligent backup and recovery method based on safe embedded system
US11862987B2 (en) 2021-12-07 2024-01-02 Inductev Inc. Contactless swappable battery system

Similar Documents

Publication Publication Date Title
US6496949B1 (en) Emergency backup system, method and program product therefor
US5748084A (en) Device security system
US20070038680A1 (en) Management of mobile-device data
US8012219B2 (en) System and method for preventing access to data on a compromised remote device
RU2384878C2 (en) System for backing-up data from remote locations
TWI317477B (en) Detection of out of memory and graceful shutdown
CN103930879A (en) Shadowing storage gateway
CN109828951B (en) Method and system for storing snapshot by combining Kubernetes and Ceph
WO1991014230A1 (en) Message communication processing system
WO2002050716A1 (en) Restoration of data between primary and backup systems
US20040143657A1 (en) Method for remote data management
US20070174692A1 (en) Image processing apparatus including function of backing up data by storing data in another device, backup program executed in image processing apparatus, and backup method
WO2017045295A1 (en) Security state identifying and alarming method and system for intelligent terminal, and intelligent terminal
US11288378B2 (en) Embedded data protection and forensics for physically unsecure remote terminal unit (RTU)
WO2007009844A1 (en) Maintaining and using information on updates to a data group after a logical copy is made of the data group
CN102687135B (en) Data are recovered in the storage medium of the electronic equipment be tampered
JP6744545B2 (en) Information processing apparatus, information processing program, and information processing system
JP2008139996A (en) Information leakage prevention system and data storage method
JPH10133971A (en) File transfer processing system
US7805563B2 (en) Tape drive apparatus
US6516423B1 (en) System and method for providing multiple queue redundancy in a distributed computing system
JP2006285446A (en) Computer system and its client computer
US7631056B2 (en) Communication server switching controller
CN100445982C (en) Computer restoration system and method with multiple restoring points
JP3928006B2 (en) Customer information management system

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KANEVSKY, DIMITRI;ZADROZNY, WLODEK;ZLATSIN, ALEXANDER;REEL/FRAME:010159/0103;SIGNING DATES FROM 19990805 TO 19990806

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 12

SULP Surcharge for late payment

Year of fee payment: 11